| BS | Base Station |
| CBS | Cloud-Based Services |
| CIA | Confidentiality, Integrity, Availability |
| CoT | Cloud of Things |
| CRA | Code Reuse Attack |
| CRO | Configurable Ring Oscillator |
| CRP | Challenge Response Pair |
| DoS | Denial of Service |
| DDoS | Distributed Denial of Service |
| FaaS | Fog as a Service |
| FCG | Fog Computing Gateway |
| HSM | Hardware Security Module |
| IaaS | Infrastructure as a Service |
| IDS | Intrusion Detection System |
| IoT | Internet of Things |
| IIoT | Industrial Internet of Things |
| ISA | Instruction Set Architecture |
| ITS | Intelligent Transportation Systems |
| LBS | Location-Based Services |
| MEC | Mobile Edge Computing |
| PaaS | Platform as a Service |
| PACS | Picture Archiving and Communication System |
| PII | Personally Identifiable Information |
| PUF | Physically Unclonable Functions |
| QoS | Quality of Service |
| RE | Reverse Engineering |
| RISC | Reduced Instruction Set Computer |
| SaaS | Software as a Service |
| SoC | System on a Chip |
| TaaS | Things as a Service |
| TRM | Tamper Resistant Memory |
| VM | Virtual Machine |